Cymmetria

At Cymmetria, we are focused on changing the asymmetry of cybersecurity, tilting the traditional security odds so that hackers are the ones who are left vulnerable. Our cyber deception solution, MazeRunner, gives organizations the ability to detect threats, shape attacker behavior, and mitigate attacks. By turning an organization's network into a labyrinth of high-risk navigational decisions, Cymmetria's MazeRunner allows for unprecedented control over an attacker's movement and activity in a network. Our team consists of cyber deception and InfoSec veterans, military specialists, and APT and malware researchers. ... Show more

The Global Deception Technology Market Report includes a comprehensive analysis of the present market. The report starts with the basic Deception Technology Market overview and then goes into each and every detail. Posted via Industry Today. Follow us on Twitter @IndustryToday

Report incorrect company information

Cymmetria Blogs

If like us you’ve done some programming with Powershell, you know there are some gotchas in the language. If you haven’t yet met them – you’re going to enjoy this one. We encountered the most recent gotcha when trying to sort a list of IP addresses according to “distance” from the local machine’s …

Cymmetria research is releasing a honeypot for detecting the new libssh vulnerability discovered week ago on October 16th. This new vulnerability could allow anyone to bypass the authentication phase of the ssh login, and gain unauthorized access to a vulnerable server without requiring a password. …

Cymmetria co-founder and CTO, Imri Goldberg, hosts a training session on writing honeypots. This webinar includes concrete techniques and examples, as well as instructions for using the open source honeypot platform, Honeycomb (https://github.com/Cymmetria/honeycomb), to utilize existing infrastruct…

When we talk about deception, we usually talk about detecting and preventing an attacker from executing lateral movement and accessing organizational assets. This post discusses using deception to actively catch an attacker who’s already deeply and comfortably entrenched in the network, and is a pri…

Since cryptocurrency, blockchain, and smart contracts have been in the news quite a bit recently, we thought we’d go ahead and add another buzzword to the combo by working deception into it! Organizations doing ICO are being targeted, and any organization dealing with cryptocurrency now has a new at…

Personal data of 1.5 million SingHealth patients has been compromised in what is being described as Singapore’s worst data breach to this day. According to analysis of the SingHealth breach by multiple sources, including the Cyber Security Agency of Singapore, the attack was a sophisticated one. The…